Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Merve Ozkan"'
Autor:
Merve Ozkan-Okay, Erdal Akin, Omer Aslan, Selahattin Kosunalp, Teodor Iliev, Ivaylo Stoyanov, Ivan Beloev
Publikováno v:
IEEE Access, Vol 12, Pp 12229-12256 (2024)
Given the continually rising frequency of cyberattacks, the adoption of artificial intelligence methods, particularly Machine Learning (ML), Deep Learning (DL), and Reinforcement Learning (RL), has become essential in the realm of cybersecurity. Thes
Externí odkaz:
https://doaj.org/article/8df1ed1bef5e41a5b155e1273bdad72e
Efficacy of blood parameters in predicting the severity of gestational hypertension and preeclampsia
Autor:
Dogukan Ozkan, Mujde Can Ibanoglu, Kevser Adar, Merve Ozkan, Omer Lutfi Tapisiz, Yaprak Engin-Ustun, Can Tekin Iskender
Publikováno v:
Journal of Obstetrics and Gynaecology, Vol 43, Iss 1 (2023)
The aim of this retrospective study was to demonstrate the effectiveness of APRI, DNI, NLR, PLR, and PDW in predicting the severity of gestational hypertension (GHT) and PE and to determine whether these factors can be used as screening tools. Normot
Externí odkaz:
https://doaj.org/article/cca7f11c13dc4a09854e34ee45a15590
Autor:
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev, Ivaylo Stoyanov
Publikováno v:
Applied Sciences, Vol 13, Iss 19, p 11067 (2023)
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The
Externí odkaz:
https://doaj.org/article/01029764a3b647fc9ab928f4c768b1ab
Publikováno v:
IEEE Access, Vol 9, Pp 83252-83271 (2021)
These days, cloud computing is one of the most promising technologies to store information and provide services online efficiently. Using this rapidly developing technology to protect computer-based systems from cyber-related attacks can bring many a
Externí odkaz:
https://doaj.org/article/b86cad2148ab424c9674a5d05c5d10d4
Publikováno v:
IEEE Access, Vol 9, Pp 157727-157760 (2021)
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are ad
Externí odkaz:
https://doaj.org/article/06005477bb9d471284c8376c93bbe302
Publikováno v:
IEEE Access, Vol 9, Pp 157639-157653 (2021)
With the advancement of technology, the use of wireless media and devices are increasing every day. In particular, the use of wireless local area networks (WLAN) has increased rapidly in recent years and is expected to increase further. The current s
Externí odkaz:
https://doaj.org/article/5245a22f018842cdab9b8e8d3613b153
Publikováno v:
Journal of the Pakistan Medical Association, Vol 72, Iss 7 (2022)
Objective: To determine sun-protection behaviours and related factors of agricultural workers in western Turkey. Method: The cross-sectional, analytical study was conducted from January to October 2019 in Aydn province Turkey after approval from th
Externí odkaz:
https://doaj.org/article/dbc3fdc54c8c456aa32c63d515510de7
Publikováno v:
European Journal of Engineering and Technology Research. 6:1-8
Cloud computing has an important role in all aspects of storing information and providing services online. It brings several advantages over traditional storing and sharing schema such as an easy access, on-request storage, scalability and decreasing
Publikováno v:
IEEE Access, Vol 9, Pp 157727-157760 (2021)
Effectively detecting intrusions in the computer networks still remains problematic. This is because cyber attackers are changing packet contents to disguise the intrusion detection system (IDS) recently. Besides, everyday a lot of new devices are ad